Dissertations / Theses on the topic 'Application for a certificate'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Application for a certificate.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Krontiris, Alexandros. "Evaluation of Certificate Enrollment over Application Layer Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-236033.
Full textDetta examensarbete analyserar säkerhetsprotokoll av typen ApplicationLayer för certifikatregistrering och hantering. EDHOC, Ephemeral Diffie-Hellman Over COSE, har implementerats, analyserats och utvärderats. EDHOC är ett nyligen utvecklat Application Layer-protokoll som är utformat för att tillhandahålla autentiserings- och nyckelfunktionsfunktioner med kompakta meddelandestorlekar och minimala rundturstider, inriktat på IoT-begränsade enheter. Huvudområdet för examensarbetet är att studera säkerhet, prestanda och skalbarhet (i fallande ordning av betydelse) hos EDHOC jämfört med andra föreslagna Application Layer-säkerhetsprotokoll som utför certifikatsskrivning.
Gaina, Maxim. "Blockchain and Smartcontracts: Fundamentals and a Decentralized Application Case-Study." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/15189/.
Full textAbakar, Mahamat Ahmat. "Etude et mise en oeuvre d'une architecture pour l'authentification et la gestion de documents numériques certifiés : application dans le contexte des services en ligne pour le grand public." Phd thesis, Université Jean Monnet - Saint-Etienne, 2012. http://tel.archives-ouvertes.fr/tel-00975965.
Full textNicodeme, Marc. "Identifiabilité des signaux parcimonieux structurés et solutions algorithmiques associées : application à la reconstruction tomographique à faible nombre de vues." Thesis, Bordeaux, 2016. http://www.theses.fr/2016BORD0096/document.
Full textThis thesis studies different minimization problems with sparses based regularization. More precisely, we want to reconstruct a sparses image, which undergone a linear transformation, with minimization problems. In this manuscript, we will be focused on l1 synthesis, analysis and block minimization which are widely used in sparse approximations. These problems offer competitive results which are theorietical understood only recntly. Different studies on the subject emphasized the contribution of a particular vector called dual certificate. The existence of this dual certificate allows simultaneously to guarantee the exact recovey of an image in noiseless case and to estimate the noise robustness in noisy case. In this work, we introduce eth existence of an optimal dual certificate for the l1 synthesis minimization which minimizes the reconstruction error. As those results have a strong geometrical interpretation, we develop an identifiability criterion which ensures the uniqueness of a solution. This criterion generalizes the work on l1 synthesis minimization tothe analysis case, block case and others
Zbierska, Katarzyna [Verfasser]. "Application and Importance of Supplementary Protection Certificates for Medicinal Products in the European Union / Katarzyna Zbierska." Aachen : Shaker, 2012. http://d-nb.info/1069050253/34.
Full textEngström, Pontus. "Modernizing forms at KTH : Using Digital Signatures." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193898.
Full textDagens myndigheter och företag har det svårt att ständigt följa den tekniska utvecklingen. Ny teknik skapar oftast nya fördelar och andra förmåner men kan ibland också orsaka problem. Att implementera ny teknik för specifika ändamål kan öka både effektivitet och säkerhet, vilket resulterar i en mer effektiv arbetsplats. En teknik som introduceras allt mer på sistone är digitala signaturer. Istället för att signera dokument med en handskriven signatur kan en digital signatur vara mer tidseffektiv och ha en högre säkerhet. För att implementera tekniken bakom digitala signaturer måste särskilda säkerhetsaspekter adresseras och specifika inställningar säkerställas. I signaturprocessen måste varje individ verifiera signaturen som är bifogad på dokumentet, denna verifiering skapar även en logg. En logg innehåller bland annat information om vem som verifierade dokumentet, om dokumentet har fler än en bifogad signatur, behöver dokumentet fler signaturer för att vara giltigt och vilken tid och datum var dokumentet signerat. En logg säkerställer validiteten av dokumentet och ökar därmed säkerheten för digitala signaturer. På KTH krävs en skriftlig ansökan för att påbörja ett examensarbete. Med nuvarande process kan det i vissa fall leda till en försenad projektstart med upp till två veckor. Den här studien syftar till att implementera digitala signaturer för ett specifikt formulär, en ansökningsblankett för att påbörja ett examensarbete. Hypotesen vid projektstart var att användning av digitala signaturer skulle kunna förminska väntetiden signifikant. Anställda på KTH som utnyttjar digitala signaturer skulle kunna förbättra deras arbetseffektivitet på grund av färre pappersutskrifter, mindre pappersarkivering och färre möten. Den här studien kommer att förse läsaren med de mest nödvändiga kunskaperna av kryptografi och hur digitala signaturer använder krypteringsfenomenet. Metodiken som användes syftade till att identifiera och modifiera specifika mjukvaruinställningar samt samla in data från studenter och personal på KTH. Den insamlade datan baserades på tidsmätningar av digitala signatursprocesser från studenter, studievägledare och handledare. Resultatet från studien visade att digitala signaturer skulle ge en snabbare signeringsprocess än nuvarande formulär. Det kan dessutom förväntas att med digitala signaturer skulle pappersutskrifter, papperstransporter och sortering av dessa dokument reduceras. Resultatet av minskad användning av fysiskt papper kommer att generera arbetsfördelar.
Blanco, Martínez Roberto. "Applications of Foundational Proof Certificates in theorem proving." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLX111/document.
Full textFormal trust in an abstract property, be it a mathematical result or a quality of the behavior of a computer program or a piece of hardware, is founded on the existence of a proof of its correctness. Many different kinds of proofs are written by mathematicians or generated by theorem provers, with the common problem of ascertaining whether those claimed proofs are themselves correct. The recently proposed Foundational Proof Certificate (FPC) framework harnesses advances in proof theory to define the semantics of proof formats, which can be verified by an independent and trusted proof checking kernel written in a logic programming language. This thesis extends initial results in certification of first-order proofs in several directions. It covers various essential logical axes grouped in meaningful combinations as they occur in practice: first,classical logic without fixed points and proofs generated by automated theorem provers; later, intuitionistic logic with fixed points and equality as logical connectives and proofs generated by proof assistants. The role of proof certificates is no longer limited to representing complete proofs to enable independent checking, but is extended to model proof transformations where details can be added to or subtracted from a certificate. These transformations yield operationally simpler certificates, around which increasingly trustworthy and performant proof checkers are constructed. Another new role of proof certificates is writing high-level proof outlines, which can be used to represent standard proof patterns as written by mathematicians, as well as automated techniques like property-based testing. We apply these developments to fully certify results produced by two families of standard automated theorem provers: resolution- and satisfiability-based. Another application is the design of programmable proof description languages for a proof assistant
Cox, Bruce. "Applications of accuracy certificates for problems with convex structure." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39489.
Full textSoják, Zbyněk. "Certifikační postupy pro experimentální letouny." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2008. http://www.nusl.cz/ntk/nusl-228076.
Full textHagström, Åsa. "Understanding Certificate Revocation." Licentiate thesis, Linköping University, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5477.
Full textCorrect certificate revocation practices are essential to each public-key infrastructure. While there exist a number of protocols to achieve revocation in PKI systems, there has been very little work on the theory behind it: Which different types of revocation can be identified? What is the intended effect of a specific revocation type to the knowledge base of each entity?
As a first step towards a methodology for the development of reliable models, we present a graph-based formalism for specification and reasoning about the distribution and revocation of public keys and certificates. The model is an abstract generalization of existing PKIs and distributed in nature; each entity can issue certificates for public keys that they have confidence in, and distribute or revoke these to and from other entities.
Each entity has its own public-key base and can derive new knowledge by combining this knowledge with certificates signed with known keys. Each statement that is deduced or quoted within the system derives its support from original knowledge formed outside the system. When such original knowledge is removed, all statements that depended upon it are removed as well. Cyclic support is avoided through the use of support sets.
We define different revocation reasons and show how they can be modelled as specific actions. Revocation by removal, by inactivation, and by negation are all included. By policy, negative statements are the strongest, and positive are the weakest. Collisions are avoided by removing the weaker statement and, when necessary, its support.
Graph transformation rules are the chosen formalism. Rules are either interactive changes that can be applied by entities, or automatically applied deductions that keep the system sound and complete after the application of an interactive rule.
We show that the proposed model is sound and complete with respect to our definition of a valid state.
Report code: LIU-TEK-LIC-2006:1
Hagström, Åsa. "Understanding certificate revocation /." Linköping : Department of Electrical Engineering, Linköpings universitet, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5477.
Full textBoinapally, Kashyap. "Security Certificate Renewal Management." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18453.
Full textBatarfi, Omar Abdullah. "Certificate validation in untrusted domains." Thesis, University of Newcastle Upon Tyne, 2007. http://hdl.handle.net/10443/1983.
Full textRobertson, Laura. "STEM K-12 Education Certificate." Digital Commons @ East Tennessee State University, 2018. https://dc.etsu.edu/etsu-works/3241.
Full textWu, Brian C. "An Identity and Certificate Manager." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/46461.
Full textIncludes bibliographical references (p. 97-98).
We have designed and implemented a software library, called Identity and Certificate Manager (ICM), for managing, using, and exchanging application-level usernames, users' digital certificates, and cryptographic username-certificate bindings. ICM can be used in a variety of personal communication applications, such as chat, email, VoIP telephony, and web browsing. As part of ICM, we designed and implemented a communication-efficient protocol, called Identity and Certificate Exchange (ICE), for exchanging certificates, usernames, and bindings within applications. The protocol avoids sending redundant information by remembering what information has been sent to whom; this feature is critical in low-bandwidth networks. The protocol also implements a robust fail-over mechanism for handling out-of-sync situations. To illustrate the benefits of ICM and ICE, we used ICM in a plugin for a popular chat-client, called Pidgin. The plugin allows users to engage in authenticated communication over any of the chat protocols supported by Pidgin, such as Jabber and Oscar (AIM). The plugin relies on ICE to provide assurances about users' identities and to efficiently disseminate users' certificates.
by Brian C. Wu.
M.Eng.
Najahi, Mohamed amine. "Synthesis of certified programs in fixed-point arithmetic, and its application to linear algebra basic blocks : and its application to linear algebra basic blocks." Thesis, Perpignan, 2014. http://www.theses.fr/2014PERP1212.
Full textTo be cost effective, embedded systems are shipped with low-end micro-processors. These processors are dedicated to one or few tasks that are highly demanding on computational resources. Examples of widely deployed tasks include the fast Fourier transform, convolutions, and digital filters. For these tasks to run efficiently, embedded systems programmers favor fixed-point arithmetic over the standardized and costly floating-point arithmetic. However, they are faced with two difficulties: First, writing fixed-point codes is tedious and requires that the programmer must be in charge of every arithmetical detail. Second, because of the low dynamic range of fixed-point numbers compared to floating-point numbers, there is a persistent belief that fixed-point computations are inherently inaccurate. The first part of this thesis addresses these two limitations as follows: It shows how to design and implement tools to automatically synthesize fixed-point programs. Next, to strengthen the user's confidence in the synthesized codes, analytic methods are suggested to generate certificates. These certificates can be checked using a formal verification tool, and assert that the rounding errors of the generated codes are indeed below a given threshold. The second part of the thesis is a study of the trade-offs involved when generating fixed-point code for linear algebra basic blocks. It gives experimental data on fixed-point synthesis for matrix multiplication and matrix inversion through Cholesky decomposition
Dickinson, Luke Austin. "Certificate Revocation Table: Leveraging Locality of Reference in Web Requests to Improve TLS Certificate Revocation." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7010.
Full textBaïz, Adam. "De l’innovation des instruments de politique publique : développement d'une méthode de conception combinatoire autour d'un langage algorithmique et application au dispositif des certificats d’économie d’énergie." Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEM053/document.
Full textAlthough it is diversely characterized, the innovative nature of instruments seems to follow three types of innovation: (a) imitations of existing instruments; (b) hybridizations of more or less coercive instruments; (c) or meta-conglomerations of instruments. After admitting that all instruments originate from one another through these three innovation paths and a unique object model, we tried to provide a new design method that would both enable the identification of innovative instruments and their design.Within the frame of intervention research, we agreed to define an instrument as a specific intended causal chain of public action, and formulated an algorithmic language along some instrumental elements (actors, actions, events, logical operators and impact vectors) in order to characterize instruments in an ostensive way. After developing a method to evaluate the newness and the effectivity of any instrument, we could more precisely define an innovative instrument as a new causal chain that is effectively implemented in the technical and social reality. As a corollary, innovating an instrument consists in designing a new causal chain, or modifying the actors and actions in it.Eventually, and in order to apply and test what we called a combinatory design method, we chose to question the innovative nature of the Energy Savings Certificates scheme (ESC). For this purpose, we elaborated an evaluation protocol and formulated several possible lines of innovation
Zhu, Lianyi. "DCMS, a digital certificate management system." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ35863.pdf.
Full textRobertson, Laura, Ryan Andrew Nivens, W. Courtney, A. Fissel, and D. O'Neal. "ETSU STEM K-12 Education Certificate." Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etsu-works/2643.
Full textEllgren, Robin, and Tobias Löfgren. "Distributed Client Driven Certificate Transparency Log." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148693.
Full textGustafsson, Josef. "Certificate Transparency in Theory and Practice." Thesis, Linköpings universitet, Databas och informationsteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-125855.
Full textMacdonell, James Patrick. "MiniCA: A web-based certificate authority." CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3256.
Full textSjöström, Linus, and Carl Nykvist. "How Certificate Transparency Impact the Performance." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-140838.
Full textBruhner, Carl Magnus, and Oscar Linnarsson. "Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167063.
Full textMuñoz, Tapia José L. (José Luis). "Desing and Evaluation of Certificate Revocation Systems." Doctoral thesis, Universitat Politècnica de Catalunya, 2003. http://hdl.handle.net/10803/7031.
Full textLa revocación de certificados se presenta como uno de los problemas más complejos a resolver en toda la PKI. Por tanto este aspecto se está convirtiendo en un punto crucial para el amplio desarrollo de las PKIs. Hay estudios que incluso argumentan que los costes de la PKI derivan en gran medida de la administración de la revocación.
Esto nos ha motivado para desarrollar nuevas propuestas. En este sentido, hemos desarrollado tres propuestas: H-OCSP (propuesta de mejora basada en el estándar OCSP), AD-MHT (propuesta basada en los árboles de hash de Merkle) y E-MHT (propuesta que aglutina varios mecanismos que permiten mejorar la eficiencia de los sistemas tradicionales basados en el árbol de hash de Merkle).
Las propuestas que se plantean en esta tesis no son solo un conjunto de mecanismos teóricos sino que son también sistemas prácticos que han sido implementados como parte de una plataforma de pruebas llamada Cervantes. El diseño de Cervantes permite además encajar cualquier otro tipo de sistema de revocación sin cambios significativos en la estructura o el código fuente de la plataforma. En particular, en esta tesis se detalla como se han implementado los dos grandes estándares de revocación: CRL y OCSP y como se han implementado las propuestas realizadas.
Finalmente utilizando Cervantes se pueden observar resultados de rendimiento para todos los sistemas estudiados y en particular nuestras propuestas han demostrado finalmente ser más escalables y eficientes en tratamiento de la información de revocación que las propuestas anteriores.
Certificates are necessary but not sufficient to secure transactions between parties. The Public Key Infrastructure (PKI) has to provide its users the ability to check, at the time of usage, that certificates are still valid (not revoked). So understanding revocation is an important concern to both PKI service providers and end users. By a better understanding of the complexities of certificate revocation, certificate-using entities can improve their decision-making process in order to accept or reject a certain certificate. In this sense, this thesis presents a comprehensive survey and analysis of the main existing revocation schemes. Furthermore, the certificate revocation represents one of the hardest scalability problems of the whole PKI; so this aspect is getting more and more crucial with the development of wide spread PKIs. There are studies that even argue that the running expenses of a PKI derives mainly from administering revocation. This motivate us to propose scalable, timely, secure, and cost-effective systems to manage the revocation information. In this respect, we have three new proposals: H-OCSP (which is a modification over the standard OCSP), AD-MHT (which is based on the Merkle Hash Tree) and E-MHT (which agglutinates several mechanisms that enhance the efficiency of traditional MHT-based systems). Our proposals are not only a set of theoretical mechanisms but they are also practical systems that have been implemented inside a Java test-bed called Cervantes (Certificate Validation Test-bed). The design of Cervantes allows it to fit any kind of revocation system without significative changes in the structure or the source code of the platform. Finally using Cervantes we are able to obtain performance results about each system developed.
Robertson, Laura, Ryan Andrew Nivens, W. Courtney, and A. Fissel. "STEM K-12 Education Certificate at ETSU." Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etsu-works/1315.
Full textElien, Jean-Emile 1974. "Certificate discovery using SPKI/SDSI 2.0 certificates." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47610.
Full textIncludes bibliographical references (leaves 67-68).
by Jean-Emile Elien.
M.Eng.
Amoozadeh, Mani. "Certificate Revocation List Distribution in Vehicular Communication Systems." Thesis, KTH, Kommunikationsnät, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119818.
Full textGuibert, Remy L. "Death certificate coding variation and coronary heart disease." Thesis, McGill University, 1987. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=66229.
Full textSpecter, Michael Alan. "The economics of cryptographic trust : understanding certificate authorities." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/104028.
Full textThesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 71-75).
Certificate Authorities (CAs) play a crucial role in HTTPS, the mechanism that secures all of the web's most important communication; if it has a log-in page, it must use HTTPS. However, recent history is littered with instances of CAs unabashedly undermining the trust model of the web in favor of economic gain, causing catastrophic harm to users in the process. The purpose of this thesis is to understand how well user, domain owner, and browser vendor controls function in order to evaluate methods of realigning CA incentives. Using a compendium of past incidents of CA failure as a series of natural experiments, along with a large dataset of all publicly available certificate collections, we find that it is possible to causally link a very slight increase in domain owners leaving a CA when a CA acts inappropriately. We further find that the technical architecture of the CA system leaves users without effective control over which CAs they trust, and that browsers face certain difficulty in distrusting larger CAs. The end result is a system where large CAs can unilaterally undermine the trust model of the web without clear repercussion.
by Michael Alan Specter.
S.M. in Technology and Policy
S.M.
Yu, Suhyoun. "Simple certificate for power distribution network security assessment." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/113748.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 53-54).
The integration of volatile renewable energy sources, non-traditional load managements, and unforeseen natural disasters introduce uncertainties that could easily jeopardize the security of power systems. Meanwhile, constructing the real solvable boundary-crucial for contingency analysis, security assessment, and planning network processes-in multidimensional parameter space is burdensome and time consuming; hence there is an urgent need for a tool to identify the security region, or the set of viable injections. This thesis presents fast and reliable inner approximation techniques for solvable boundaries of power distribution systems based on Banach fixed point theorem and Kantorovich theorem. The novel method is in a simple "certificate" form-a single lined inequality condition that involves the system variables and parameters. Our certificate is noniterative, therefore computationally efficient, and the simulation results confirm that the presented approach constructs regions that are sufficiently large for most security-constrained functions. The construction for our "certificates" begins with re-formulating power-flow equations into appropriate forms such that they are applicable to the aforementioned two major theorems. Practical applications of the proposed technique include fast screening tool for feasible injection change, certified solvability margins, and new computationally robust continuation power flow algorithms.
by Suhyoun Yu.
S.M.
Martin, M. Troy. "Student Retention and Persistence in Certificate-First Programs." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9232.
Full textDahlberg, Rasmus. "Aggregating Certificate Transparency Gossip Using Programmable Packet Processors." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-65977.
Full textHITS, 4707
Almoaber, Basmah. "Bootstrapping Trust Evaluation Using a Trust Certificate Model." Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/32141.
Full textBergström, Anna, and Emily Berghäll. "Public certificate management : An analysis of policies and practices used by CAs." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177148.
Full textNowatkowski, Michael E. "Certificate revocation list distribution in vehicular ad hoc networks." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33971.
Full textSamuelsson, Mathias. "DANE with OpenSSL : PKIX certificate authentication throughDNS using OpenSSL." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-176749.
Full textBedford, Ronald L. Field R. William. "Utility of death certificate data in predicting cancer incidence." [Iowa City, Iowa] : University of Iowa, 2009. http://ir.uiowa.edu/etd/336.
Full textHernández, Gañán Carlos. "Certificate status information distribution and validation in vehicular networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/286193.
Full textLas redes vehiculares ad hoc (VANETs) se están convirtiendo en una tecnología funcional para proporcionar una amplia gama de aplicaciones para vehículos y pasajeros. Garantizar un funcionamiento seguro es uno de los requisitos para el despliegue de las VANETs. Sin seguridad, los usuarios podrían ser potencialmente vulnerables a la mala conducta de los servicios prestados por la VANET. La solución básica prevista para lograr estos requisitos es el uso de certificados digitales gestionados a través de una autoridad de certificación (CA). De acuerdo con la norma IEEE 1609.2, las redes vehiculares dependerán de la infraestructura de clave pública (PKI). Sin embargo, el proceso de distribución del estado de los certificados, así como el propio proceso de revocación, es un problema abierto para VANETs.En esta tesis, en primer lugar se analiza el proceso de revocación y se desarrolla un modelo preciso y riguroso que modela este proceso conluyendo que el proceso de revocación de certificados es estadísticamente auto-similar. Como ninguno de los modelos formales actuales para la revocación es capaz de capturar la naturaleza auto-similar de los datos de revocación, desarrollamos un modelo ARFIMA que recrea este patrón. Mostramos que ignorar la auto-similitud del proceso de revocación lleva a estrategias de emisión de datos de revocación ineficientes. El modelo propuesto permite generar trazas de revocación sintéticas con las cuales los esquemas de revocación actuales pueden ser mejorados mediante la definición de políticas de emisión de datos de revocación más precisas. En segundo lugar, se analiza la forma de implementar un mecanismo de emisión de datos de estado de los certificados para redes móviles y se propone un nuevo criterio basado en una medida del riesgo para evaluar los datos de revocación almacenados en la caché. Con esta medida, la PKI es capaz de codificar la información sobre el proceso de revocación en las listas de revocación. Así, los usuarios pueden estimar en función del riesgo si un certificado se ha revocado mientras no hay conexión a un servidor de control de estado. Por otra parte, también se propone una metodología sistemática para construir un sistema difuso que ayuda a los usuarios en el proceso de toma de decisiones relacionado con la comprobación de estado de certificados.En tercer lugar, se proponen dos nuevos mecanismos para la distribución y validación de datos de estado de certificados en VANETs. El primer mecanismo está basado en el uso en una extensión de las listas estandares de revocación. La principal ventaja de esta extensión es que las unidades al borde de la carretera y los vehículos repositorio pueden construir una estructura eficiente sobre la base de un árbol de hash autenticado para responder a las peticiones de estado de certificados. El segundo mecanismo tiene como objetivo optimizar el equilibrio entre el ancho de banda necesario para descargar los datos de revocación y la frescura de los mismos. Este mecanismo se basa en el uso de un esquema híbrido de árboles de Merkle y delta-CRLs, de modo que el riesgo de operar con certificados revocados desconocidos permanece por debajo de un umbral durante el intervalo de validez de la CRL base, y la CA tiene la capacidad de gestionar este riesgo mediante el ajuste del tamaño de las delta-CRL. Para cada uno de estos mecanismos, llevamos a cabo el análisis de la seguridad y la evaluación del desempeño para demostrar la seguridad y eficiencia de las acciones que se emprenden.
Zhang, Jing. "Flexible Certificate Management for Secure HTTPS Client/Server Communication." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-4135.
Full textCertificate management is a crucial element in PKI implementations, which includes certificate generation, distribution, storage, and revocation. Most of the existing research has been focusing on the security aspect or the functionality and the structure of certificate management systems. Very little has looked at the actual user requirements for the system and how users can use the system conveniently and practically, which is actually a very important factor for the whole security system to work properly and to be widely accepted.
In this thesis we have designed a framework that provides a flexible certificate management for different security levels according to user requirements and situations, and with a user-friendly interface. A certificate management system CSA (Certificate Server Adapter) is implemented for HP OpenView Operations for Windows (OVO/Windows), which is a management software product provided by Hewlett-Packard. The CSA helps OVO/Windows to provide secure HTTPS client/server communication. Tests show that it offers a good enough security for all situations without compromise and, at the same time, the best convenience and flexibility are achieved. However, the CSA can be further improved to have a lifetime management of the created certificates, an enhanced user interface, and an API to plug-in other PKI solutions.
Brocklebank, R. J., and n/a. "The ACT year 12 certificate : a student based review." University of Canberra. Education, 1985. http://erl.canberra.edu.au./public/adt-AUC20060613.133106.
Full textChen, Sung-neng, and 陳松能. "Certificate Management and Its Application." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/78017449045614912758.
Full textChang, Chun, and 張群. "The Application of Microsoft Certificate Service - An example of campus digital certificate." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/12941745350781656330.
Full text樹德科技大學
資訊管理研究所
91
In the increasingly complicated environments of information processing, the amount of servers and the requirements network operating in an organization are continually growing. A companied issue is the extreme requirements of information operating security. Facing the crises of increasing network crimes and hackers who exist anywhere, how to establish a reliable security mechanism for improving the security of information system and network operating by means of fast, low cost and low risk is the important issue to information managing department and information technologists of an organization. Network information processing has to meet five requirements of integrity, authentication, non-repudiation, confidentiality, and access control. On the basis of digital certificate and public key infrastructure, utilizing a smartcard can meet these requirements. However, if this security mechanism completely built up by outsiders, it may not be economic due to the timing and considerable expense. Fortunately, in Windows 2000 operation system Microsoft builds in some related and required components of security mechanism. Therefore, if one buys a smartcard and smartcard writer/reader, he/she will be enabled to build up a security mechanism by himself/herself. In association with the digital certificate and public key infrastructure, how to rapidly establish this security mechanism for the use of present information operating frame of an organization is the aim of this research project. This proposal will conductive an experimental research undertaken in author’s employed institute, attempting to establish the application of this security mechanism with an immediately significant improvement in the security of organization information processing.. To conduct this research project, experimental work was undertaken in author’s employed institute by utilizing Microsoft digital certificate, public key infrastructure and smart card. The integral application of three mechanisms was established by providing server interactive single sing-on, web page identification and authorization, and email digital certificate as well as encoding/decoding. Furthermore, this integral application was applied to institute attempting to give an immediately significant improvement in the security of information processing.
魏鼎洋. "Application and Implementation of X.509v4 Attribute Certificate." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/59920111825070022391.
Full text國立交通大學
資訊工程系所
93
There is a predicament about authorization using identity certificate in the network. In this paper, we discuss the application and related implementation of X.509v4 attribute certificate on for solving the predicament. The attribute certificate is a kind of short-term certificate. The main different from identity certificate is no public key on the attribute certificate. An attribute certificate is used to bind a set of attributes to its holder. The attributes are the privileges which holder is allowed for. Therefore, the attribute certificate must be used together with identity certificate. In application of the attribute certificate, it defines Privilege Management Infrastructure (PMI) in X.509v4 specification. PMI can support privilege management and authorization, and almost cooperate with PKI. X.509v4 proposes four kinds of PMI models to offer various kinds of more flexible applications of attribute certificate. In implementation of attribute certificate, I will introduce relevant knowledge and tools in advance and then show how to sign an attribute certificate. Except the implementation of attribute certificate, I also implement simple Attribute Authority server and Privilege Verifier server in PMI. Try to simulate two kinds of scenarios about client, requesting Attribute Authority server for the attribute certificate and requesting Privilege Verifier server for resources.
張懿範. "The Implementation and Application of Project Management Certificate in Taiwan." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/82912194635447624388.
Full text明新科技大學
營建工程與管理研究所
97
In recent years, project management, which originated from Europe and the United States, is popularized to the whole world fast. In the trend of globalization and rapid social change, the employee’s ability in project management has got more attention and demand for enterprise manager. Consequently, the number of project management certificate is grown quickly in Taiwan and all over the world. This study intend discussing the implementation and application of project management certificate in Taiwan. The methods of this study are literatures review, expert interviews and questionnaire survey. In expert interviews, 20 experts has been interviewed and divided into three categories, including scholar, organization for certificate and license holders in project management domain. The survey questionnaire is send to the license holders, and 439 valid results is got in this study. The questionnaire analysis includes the statement statistics, ANOVA and cross analysis by using the SPSS statistical software package. The results of this study can offer reference information for organization of certificate, government section, enterprise and others who interesting in project management.
CHEN, CHUN-AN, and 陳俊安. "Application of Blockchain Technology to Grade Certificate of Martial Arts." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/m57wp9.
Full text國立臺北科技大學
管理學院EMBA大上海專班
107
In the progress of development of martial arts, in the case of cross-regional spread and development, sometimes the messages of the inheritance system could be lost, controversial or wrong, especially when there are members who establish their own subsystem. Compared with the internationalization of karate, taekwondo, judo and aikido, the development of traditional Chinese martial arts often cannot unify resources and development together, due to the various sects or systems lack of mutual trust. Therefore, the progress of the systematic promotion and development is slow. Among the reasons, grade certificate plays a key role. In recent years, because of the development of blockchain technology, technology through machine trust mechanism has become possible. This study collects case data for Taijiquan, Baoding fast wrestling and North Shaolin Long Fist through documents and case interviews to analyze the common characteristics and industrial needs of martial arts, to find out the current industry pain points and application scenarios of martial arts in the grade certificate. At last, the feasibility of applying the blockchain in the martial arts sport was confirmed, and the technical solution of applying the Ethereum blockchain smart contract on the Inter Planetary File System platform was proposed to ensure the safety and credibility of the data of the grade certificate, and to improve the promotion efficiency of martial art.
Chen, Chin-Shong, and 陳慶雄. "An Application of Citizen Digital Certificate and WAPI to WLAN Roaming Authentication." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/94126334686249251442.
Full text逢甲大學
資訊工程所
93
With the fashion of internet and the popularization from our government, the amount of WLAN Hot Spot which located on railway station, hotel, airport or cafe is increasing obviously. User can get on net simply using a notebook or a PDA to obtain any resource from the internet. Up to the end of 2004, 30 of 158 academies joined the roaming scenario across campus of national high speed network project and 94% of those academies will construct their own WLAN environment in the near future.However, the security insufficiency of IEEE 802.11 which includes user identity authentication and data encryption caused a loophole of risk. SSID and WEP were used for authentication but have been proved to be not safe already. Hence, it would be an important topic to ensure a legitimate user and a safe internet environment.In this paper, we will discuss the authentication method and security of campus WLAN roaming environment and propose a WAPI with Citizen Digital Certificate to design a new way for campus WLAN roaming application. Simply using a digital certification and related public information, roaming between different campus was finally realized.
Tang, Shih-chieh, and 唐士傑. "Establishment and Application Analysis of Building Energy Performance Certificate Evaluation Systems in Taiwan." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/05024234503605624370.
Full text國立中山大學
機械與機電工程學系研究所
98
Being located in subtropical climates, the cooling energy accounts for a huge percentage of the total power consumption, and has become the major cause for power shortages. Therefore, building energy conservation strategies has become the major remedy to tackle this problem. In this study, the building energy performance certificate evaluation system has been established, in referencing the European communities systems, while integrating the financial and consumers factors to establish the building labeling system in Taiwan.
梁桂芳. "The critical making that integrate application system of internal organization with Citizen Digital Certificate." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/44809585233516505223.
Full text